Words to know
The world of IoT connectivity is filled with technical terms and industry jargon—but understanding them shouldn't be a challenge. We believe in making things simple and clear, so this glossary is here to help.
Understanding IoT connectivity, global SIMs, and telecom infrastructure can be challenging, especially when selecting providers or managing deployments across multiple regions.
This glossary defines essential terms in cellular IoT, eSIM, iSIM, APNs, and data pooling. Whether you are a CTO, connectivity engineer, or product leader, rely on this guide to make informed and efficient decisions for secure, scalable IoT deployment.
An APN is a separate network within the mobile network, where connected devices are granted access to the internet. When you use mobile data, your device connects to an APN and is granted internet access. Most carriers provide one or more APNs to deliver data -services.
BIP enables a SIM card to communicate directly with the network, independently of the device it’s in. This allows essential services like mobile payments or remote updates to run smoothly, even if the device isn’t actively using its main internet connection. BIP ensures seamless and reliable connectivity for critical IoT applications.
The Core Network consists of multiple systems that facilitates different telecommunication services. It manages subscribers, voice, data, and messaging services. It connects users to the internet, mobile, or landline networks, while handling tasks like authenticating users, routing calls, and ensuring security. Think of it as the “brain” of the telecom network, ensuring smooth and reliable communication.
Our Connectivity Management Platform (CMP) gives you full visibility. See per-SIM and total pool usage, set alerts, and export reports—all in real-time. You’ll always know how your data is used and can adjust thresholds, groupings, or activate new SIMs as needed.
A data pool is a shared collection of data that multiple devices within your organisation can access. Think of it like a family plan for data, where all your active SIMs can pull from the same source, but with much more flexibility and control. Instead of individual data limits for each SIM, they all share one large pool of data.
What is eSIM?
An eSIM consists of a small chip (eUICC) soldered directly onto a device's circuit board during manufacturing, eliminating the need for physical SIM cards. For IoT deployments, eSIMs enable remote SIM provisioning and carrier switching without physical access to devices, significantly reducing operational costs and deployment time. This technology is particularly valuable for global IoT deployments, allowing businesses to manage their entire device fleet through a single platform while maintaining local connectivity options worldwide.
Order your IXT Global SIM here.
IMEI is a 15-digit unique identifier assigned to every mobile device that allows networks to identify valid devices. It identifies a device manufacturer, device model, and device. The format consists of: TAC (Type Allocation Code: 7 digits) + Serial Number (6 digits) + Checksum (1 digit). The TAC is used to identify the manufacturer and the device model.
IMSI is a globally unique identifier stored on a SIM card that identifies both the subscriber and their mobile operator. The IMSI is usually not transmitted in clear, but as a temporary number called TMSI. The format consists of: MCC (Mobile Country Code: 3 digits) + MNC (Mobile Network Code: 2-3 digits) + MSIN (Mobile Subscriber Identification Number: 9-10 digits).
iSIM represents the next evolution in SIM technology, integrating SIM functionality directly into a device's main processor or cellular modem. For IoT deployments, iSIM offers enhanced security through hardware-level integration while reducing device size, power consumption, and manufacturing costs. This makes it especially suitable for mass-scale IoT deployments where device miniaturisation and cost efficiency are crucial.
LoRaWAN is a Low-Power Wide-Area Network (LPWAN) protocol designed for IoT applications that require long-range, energy-efficient connectivity. It enables businesses to deploy battery-powered sensors and devices that can operate for years without maintenance. The protocol's long-range capabilities allow for efficient coverage of large industrial sites, agricultural operations, or city-wide deployments with minimal infrastructure investment, making it cost-effective for large-scale IoT networks.
LPWAN is a wireless network type optimised for IoT deployments that need to communicate over long distances using minimal power. LPWAN technologies enable cost-effective deployment of large-scale sensor networks, asset tracking systems, and remote monitoring solutions. These networks are particularly valuable for businesses managing distributed assets across large geographical areas while maintaining low operational costs, for example applications such as environmental monitoring, asset tracking, and smart metering, where energy efficiency is crucial.
LTE, commonly referred to as 4G, is a high-speed mobile network technology that delivers faster data speeds and lower latency than its predecessors. In IoT, LTE supports bandwidth-intensive applications like video surveillance, industrial automation, and remote equipment monitoring. Its widespread availability makes it ideal for IoT solutions requiring reliable, high-speed connectivity across urban and suburban areas.
LTE Cat 1 is a low-power variant of LTE optimised for IoT devices. It balances moderate data rates with energy efficiency, making it ideal for applications like connected wearables, point-of-sale terminals, fleet management, and industrial automation.
LTE-M is a low-power LTE technology specifically designed for IoT devices. It supports extended coverage (including deep indoor coverage) and efficient power usage, making it ideal for enterprise IoT deployments needing reliable connectivity in challenging environments like basements or remote locations. The technology's power efficiency and enhanced coverage characteristics make it particularly valuable for utility metering, asset tracking, and industrial monitoring applications where devices need to operate for years on a single battery.
Machine-to-Machine (M2M) refers to technology that enables devices to communicate directly with each other. M2M is a broader term than the Internet of Things (IoT), as it simply covers the exchange of data between machines, regardless of the type of network or devices involved. This can happen over various networks such as Ethernet, Wi-Fi, cellular or satellite. It’s used in industries like manufacturing, logistics, and healthcare to automate processes, improve efficiency, and gather real-time data from connected machines.
Permanent Roaming is when a device continuously uses a network outside its home region. If a device is roaming in a network outside its 'home' region for an extended period it may be considered a permanent roamer. If your carrier does not have the proper roaming agreements this could lead to your devices being kicked off the network. It is also important to note that some countries enforce strict policies that forbids permanent roaming.
Think of a private APN like a closed network, where connected devices can communicate securely. Access to external systems/servers is limited and only allowed if configured.
For IoT deployments, private APNs enable businesses to isolate their device traffic from public networks, implement custom security policies, and maintain direct control over data routing. This infrastructure is particularly crucial for sensitive applications like industrial automation, healthcare monitoring, or financial services where data security and network reliability are paramount.
SASE combines network and security functions into a cloud-based service that enables secure connectivity for IoT devices regardless of their location. In B2B IoT deployments, SASE provides unified security policies, threat protection, and network optimisation across your entire device fleet, ensuring consistent security standards whether devices are connecting through cellular networks, Wi-Fi, or other connectivity options. This architecture is particularly valuable for businesses managing large-scale IoT deployments where devices need secure access to cloud services and enterprise applications from various locations and network types.
SASE combines network and security functions into a cloud-based service that enables secure connectivity for IoT devices regardless of their location. In B2B IoT deployments, SASE provides unified security policies, threat protection, and network optimisation across your entire device fleet, ensuring consistent security standards whether devices are connecting through cellular networks, Wi-Fi, or other connectivity options. This architecture is particularly valuable for businesses managing large-scale IoT deployments where devices need secure access to cloud services and enterprise applications from various locations and network types.
SIM (Subscriber Identification Module) is a small removable chip that stores key information like the International Mobile Subscriber Identity (IMSI) and encryption keys, enabling devices to connect to cellular networks. There are five main form factors for physical SIM cards: Full-Size (FF1), Mini-SIM (FF2), Micro-SIM (FF3), Nano-SIM (FF4), and Embedded SIM (MFF2). Over time, SIM cards have become smaller, offering hardware advantages like more space for other components. Each SIM type can operate with different software: ICC, UICC, or eUICC.
A UICC (Universal Integrated Circuit Card) is a multi-application smart card platform featuring an integrated circuit with processing capabilities, multiple memory types (NVRAM, ROM, RAM), and standardised security architecture that enables interoperability across 3G, 4G, and LTE networks. It serves as the foundational hardware for various subscriber identity modules (USIM, CSIM, ISIM), allowing secure authentication and global network compatibility through a unique identifier while providing scalable storage capacity from 256KB to over 1GB for both network authentication data and user applications.
RSP is an umbrella term for various GSMA standards for remote SIM provisioning:
M2M: SGP.02
Consumer: SGP.22
IoT: SGP.32
RSP technology makes it possible to swap operator/subscription without replacing the physical SIM card.
What is a VPN?
A Virtual Private Network (VPN) creates an encrypted tunnel for IoT devices to securely communicate with enterprise networks and cloud platforms across public internet connections. In IoT deployments, VPNs provide an additional layer of security by encrypting device data transmission, preventing unauthorised access, and ensuring sensitive information remains protected as it travels between devices and your core systems. This technology is particularly important for IoT applications handling sensitive data or requiring secure remote management capabilities, such as industrial control systems, healthcare devices, or financial transaction terminals.
About the author
IXT writes about IoT connectivity because we build it. We’re a Full-MVNO with our own core network and a CMP we designed in-house, so we see what works at scale and what doesn’t. Our team has decades of experience in M2M/IoT, from network engineering to enterprise rollouts, so the guidance we share is practical, vendor-agnostic and field-tested. Connect, secure and manage devices with confidence using our IoT Connectivity.
IXT – Connected. Secure. Everywhere.
The ultimate connectivity guide.
A practical guide getting you ready for your next IoT deployment.
Get your guideWhat is IoT connectivity?
IoT connectivity refers to the cellular networks that link distributed devices to backend systems. Devices use technologies like 4G, LTE-M, NB-IoT, or 5G to communicate with cloud platforms, applications, and enterprise infrastructure.
Cellular remains the most scalable option for IoT. It delivers global reach, high reliability, and long-term network support across every continent. Unlike Wi-Fi or fixed-line connections, cellular works in remote locations, moving vehicles, and outdoor installations where other options fail.
Why IoT connectivity matters for critical operations
Modern IoT deployments face several pressures that make connectivity a strategic decision, not a technical afterthought.
Engineering and product teams need to solve for global scale without managing multiple carrier contracts, visibility and diagnostics across thousands of devices, reliable uptime for mission-critical systems, compliance with regulations like NIS2 and GDPR, security for device traffic crossing borders, predictable costs as fleets grow, and support for over-the-air updates and remote management.
Industry data from IoT Analytics and GSMA Intelligence shows IoT deployments growing 15 to 20 percent annually in sectors like EV charging, utilities, logistics, and industrial automation. These industries depend on stable global connections to keep operations running.
Core requirements for modern IoT connectivity
High availability
systems like EV chargers, grid infrastructure, and security devices need reliable coverage in urban and rural locations. Multi-network access in each country keeps uptime stable. If one network has an outage, traffic routes through an alternative.
Low latency and stable performance
Industries like predictive maintenance, factory automation, and security require low latency for real-time actions. 5G and LTE-M deliver improved performance in high-density environments where older technologies struggle.
Security and traffic protection
Public networks expose device traffic to external threats. IoT devices often run unattended in the field, making them targets for attacks. Secure deployments use private routing, VPNs, or Zero Trust security enforced in the cloud.
Device identity and control
Each device needs a secure identity. SIM, eSIM, and iSIM provide hardware-based authentication and a foundation for routing, access policies, and monitoring.
Cost efficiency through data pooling
Device usage varies. Some SIMs consume more data than expected. Others use almost nothing. Shared data pools reduce waste by grouping all SIMs under one subscription. If one device uses less, another uses more. No individual limits, no surprise overage fees.
Simple management at scale
A connectivity management platform gives real-time diagnostics, SIM lifecycle management, alerts, and analytics. Without centralized visibility, troubleshooting becomes reactive and slow.
IoT connectivity technologies explained
IoT devices use different cellular and low-power technologies depending on the use case.
2G and 3G (legacy technologies)
These networks are being shut down globally. The GSMA Network Shutdown Tracker shows most countries phasing out 2G and 3G by 2025 to 2028. New deployments should avoid these technologies entirely.
4G LTE
Widely available and stable. Best for general IoT use cases like asset tracking, retail, EV charging infrastructure, and sensors that need consistent throughput.
LTE-M (LTE Cat-M1)
Low-power, long-range cellular. Suitable for smart metering, industrial sensors, alarms, and utilities. Devices running on LTE-M run on battery for years.
NB-IoT
Ultra-low-power with excellent indoor coverage. Used in water meters, environmental sensors, and devices deployed in basements or underground locations.
5G standalone
High bandwidth and extremely low latency. Supports advanced automation, robotics, and dense sensor deployments. Ideal for real-time control applications.
Private APN and DNN
Private routing for device traffic. Directs IoT data into enterprise systems without exposing it to the public internet. Traffic stays isolated and controlled.
Zero Trust for IoT
A modern replacement for VPN-based IoT security. Zero Trust validates every device and session before granting access. It enforces policies in the cloud rather than relying on network perimeter defenses.
Challenges CTOs face with IoT connectivity
Field data and industry analyses reveal the same recurring problems for IoT teams.
Fragmented carriers and contracts
Managing multiple mobile operators across regions adds complexity. Each country requires separate negotiations, different SIM profiles, and distinct contracts. This slows deployment and increases administrative overhead.
Coverage inconsistency
Different carriers perform better in different areas. Single-network SIMs risk downtime when the primary carrier has coverage gaps or outages.
Security gaps
Public networks expose device IP addresses and traffic. Attackers can intercept data, inject malicious commands, or use compromised devices to access broader networks.
Limited visibility into device performance
Without a centralized platform, teams struggle to identify why devices disconnect or behave abnormally. Troubleshooting becomes guesswork.
Cost spikes from per-SIM bundles
Devices rarely consume predictable amounts of data. Fixed bundles create waste when devices use less than allocated, or overage charges when they use more.
Complex troubleshooting
Different networks, roaming agreements, and APN configurations increase support workload. Every region has its own quirks.
Regulatory pressure
NIS2 in Europe requires network segmentation, secure configuration, and incident response capabilities for critical infrastructure. GDPR mandates data protection for any personal information transmitted by devices. Non-compliance carries significant fines and operational risk.
Security and compliance in IoT connectivity
Security is not optional for IoT. Connected devices handle payment data, operational commands, personal information, and critical infrastructure controls. A breach affects more than IT systems. It disrupts physical operations.
The problem with traditional VPN-based security
Many IoT deployments still rely on VPNs to secure device traffic. This approach has significant weaknesses.
Device IP addresses remain exposed on the public internet. Once an attacker compromises one device, they can move laterally across the network. VPN configuration is complex to manage at scale. Traffic passes through tunnels without inspection, hiding threats.
Zero Trust: A better approach for IoT
Zero Trust security assumes no device or connection is trustworthy by default. Every device and session must be verified before access is granted.
For IoT, this means the SIM provides device identity, the device establishes secure outbound-only connections, traffic routes through a private cloud layer where policies are enforced, and no device has direct access to internal systems without validation.
This architecture aligns with NIS2 requirements for network segmentation, secure configuration, and continuous validation.
What NIS2 requires for IoT deployments
NIS2 applies to operators of essential services and critical infrastructure across Europe. For IoT deployments, compliance means network segmentation to isolate IoT traffic from corporate systems, secure default configurations for all devices, incident detection and response capabilities, supply chain security including connectivity providers, and regular risk assessments.
Organizations that fail to comply face fines up to 10 million euros or 2 percent of global turnover. Beyond fines, non-compliance creates operational risk. Regulators can mandate operational changes or suspend services.
IoT connectivity by industry
Different industries have distinct connectivity requirements. Here is how IoT connectivity supports specific use cases.
EV charging
EV charging networks operate thousands of stations across multiple countries. Each charger needs connectivity for payment processing, remote diagnostics, smart grid integration, predictive maintenance, and real-time availability reporting.
A charging network with 5,000 stations across 12 European countries needs real-time payment authorization at every transaction. Downtime at a single station frustrates drivers and loses revenue. A global SIM with multi-network access eliminates 12 separate carrier contracts. The connectivity management platform shows which stations are online, which have connectivity issues, and where data usage is abnormal.
IXT Global SIM and IXT CMP solve these challenges with multi-network coverage, real-time diagnostics, and a global data pool that keeps costs predictable as the network grows.
Industrial automation and predictive maintenance
Factories and industrial facilities use IoT for machine-to-machine communication, predictive maintenance, process optimization, and real-time control.
A manufacturing plant with 200 connected machines across three countries needs ultra-low latency for real-time control signals. Sensors report vibration, temperature, and performance data continuously. When a machine shows early signs of failure, maintenance teams respond before a breakdown stops production.
Connectivity requirements include ultra-low latency, high reliability, edge computing support, and machine-to-machine communication. Private networking keeps operational data isolated from public internet threats.
Utilities
Utilities deploy IoT for smart metering, grid monitoring, fault detection, and demand response.
A power distribution company with 500,000 smart meters needs deep indoor coverage. Meters sit in basements, meter rooms, and underground installations where signal penetration matters. NB-IoT and LTE-M provide the low-power, long-range coverage required. Data pooling eliminates the complexity of managing individual meter subscriptions.
Connectivity requirements include wide area coverage, low power consumption, secure communications, and long-term stability. Utilities operate infrastructure for decades. Connectivity providers must support devices through network transitions.
Security and alarms
Security systems need the lowest possible latency for real-time alerts. Video surveillance generates high data volumes. Access control, intrusion detection, and environmental monitoring all require redundant connectivity.
A security company managing 10,000 alarm panels needs failover capability. If the primary network goes down, alarms must still reach the monitoring center. Multi-network SIMs provide redundancy. Private networking ensures alarm signals are not exposed to interception.
Connectivity requirements include low latency, high reliability, secure communications, redundant connectivity, and video streaming capability.
Tracking and Logistics
Logistics companies track assets, vehicles, and cargo across borders. GPS tracking, condition monitoring (temperature, humidity, shock), route optimization, and theft prevention all depend on cellular connectivity.
A logistics company shipping temperature-sensitive pharmaceuticals across Europe needs continuous condition monitoring. If a refrigerated container loses cooling, alerts must trigger immediately. Cross-border connectivity means a single SIM works across every country without roaming negotiations.
Connectivity requirements include wide area coverage with LPWAN and LTE-M support, real-time tracking with minimal latency, low power consumption for battery-powered trackers, and secure data transmission.
How IXT solves IoT connectivity challenges
IXT delivers global IoT connectivity for industries like EV charging, utilities, automation, security, logistics, and tracking. The portfolio includes IXT Global SIM, IXT SecureNet, IXT Global Data Pool, and IXT Connectivity Management Platform.
Each product builds on the same principle: simple, secure, global IoT connectivity that scales.
IXT Global SIM: One SIM for global coverage
IXT Global SIM provides global connectivity in a single subscription. Key capabilities include SIM, eSIM, and iSIM options in multiple form factors, multi-IMSI technology with access to 600+ mobile networks across 190+ countries, multi-network access per country for uptime and redundancy, instant activation and deployment, no need for multiple carrier contracts, flexible routing, and data pooling across all SIMs.
A single SIM works across borders. Devices connect to the strongest available network in each location. If one network has issues, traffic routes to an alternative.
IXT SecureNet: Private networking and secure routing
IXT SecureNet moves device traffic off the public internet. It is purpose-built to keep IoT traffic isolated and deliver secure, direct access between devices and enterprise systems.
Features include private APN or DNN configuration, direct cloud integration with AWS, Azure, and GCP, private IP ranges, secure routing and VPN options, extended SLA, and SASE-ready architecture for Zero Trust security.
Device traffic remains isolated, protected, and compliant with security standards. Data never touches the public internet.
IXT Global Data Pool: Shared data for all SIMs
All SIMs share one unified pool of data across countries. This improves efficiency and eliminates surprise usage spikes.
With 100 SIMs averaging 1GB each, instead of giving each SIM a fixed 1GB limit, all 100 SIMs share a 100GB pool. Some devices use less, others use more. As long as total usage stays within the pool, there are no overage charges and no devices going offline.
The data pool works globally, provides predictable costs, automatically redistributes unused data, and works across all active devices.
IXT Connectivity Management Platform
The IXT CMP gives technical teams real-time control through one platform.
Key capabilities include real-time status for all SIMs across regions, usage and cost monitoring with live data, diagnostics for troubleshooting connectivity events, comprehensive reporting and audit trails, bulk actions for fleet management, and API integration for connecting to existing systems.
The platform provides global visibility and control of all SIMs in one dashboard. Teams can add, modify, or suspend SIMs in a few clicks. Full audit trails support compliance requirements.
Why IXT is different
IXT stands apart from traditional MNOs, basic MVNOs, and other IoT connectivity providers in four areas.
One SIM with global coverage and Data Pool
IXT SIM gives global coverage and a global data pool for full flexibility across your SIM fleet. No need to manage multiple carriers, plans, or contracts. One SIM, one subscription, one platform.
Enterprise-grade security with SecureNet
SASE-ready security through private networking, VPNs, and direct cloud connections. Data stays protected. Risk stays low. Traffic never touches the public internet.
Experienced IoT partner
IXT is a hands-on partner with deep telecom and IoT knowledge. The team supports customers with practical guidance, technical insight, and a long-term mindset. Customers deploy and scale with confidence.
To learn more about IXT, check out our About Us page here.
Simplified connectivity management
The IXT CMP makes it easy to monitor, manage, and optimize connectivity across regions and devices. Real-time insight into SIM status and data usage. Features that save time and make management simple.
How to choose an IoT connectivity provider
When evaluating providers, focus on these criteria.
Coverage and multi-network redundancy
Ensure multiple networks are available in each region. Single-network SIMs create single points of failure. Ask how many networks the provider can access in your target countries.
Security features
Look for private networking, cloud security integration, routing control, and Zero Trust capabilities. Ask whether traffic stays on the public internet or routes through private infrastructure.
Control and visibility
Require real-time dashboards, diagnostics, and API access. Without visibility, troubleshooting becomes reactive. Ask to see the management platform before signing.
Scalability
Confirm support for thousands of devices and cross-border deployments. Ask how the provider handles new country rollouts and network transitions.
Flexible commercial model
Prioritize data pooling, predictable pricing, and no vendor lock-in. Ask about contract terms, minimum commitments, and how costs scale with fleet growth.
Industry expertise
Different industries have different requirements. EV charging needs real-time payment processing. Utilities need deep indoor coverage. Ask for references in your specific sector.
Common reasons IoT deployments fail
Based on recurring issues across IoT projects, these are the most common failure points.
- Single-carrier SIMs failing in weaker coverage areas create gaps in connectivity that disrupt operations.
- No visibility into device disconnects means teams only learn about problems when customers complain.
- Complex integration with legacy systems slows deployment and creates ongoing maintenance burden.
- High roaming costs surprise finance teams when devices cross borders.
- Security gaps expose devices to attack and create compliance risk.
- Missing local compliance creates regulatory exposure in new markets.
- Reactive troubleshooting based on user complaints wastes engineering time and damages customer relationships.
A global SIM with multi-network access and a robust connectivity management platform solves most of these issues.
Frequently asked questions
What is a global IoT SIM?
A global IoT SIM is a single SIM card that provides cellular connectivity across multiple countries without requiring separate carrier contracts for each region. It uses multi-IMSI technology to connect to the strongest available network in each location.
How does private networking work for IoT?
Private networking routes IoT device traffic through isolated infrastructure rather than the public internet. Devices connect through private APNs or DNNs directly to enterprise systems or cloud platforms. Traffic never touches public networks where it could be intercepted.
What is Zero Trust IoT security?
Zero Trust assumes no device or connection is trustworthy by default. Every device must authenticate using its SIM identity. Every session must be validated before access is granted. Policies are enforced in the cloud rather than at the network perimeter.
What is a connectivity management platform?
A connectivity management platform provides centralized visibility and control over all SIMs in a deployment. It shows real-time status, usage, and diagnostics. Teams can activate, suspend, or modify SIMs from one dashboard.
How does data pooling reduce IoT connectivity costs?
Data pooling combines the data allocation for all SIMs into one shared pool. Devices that use less data offset devices that use more. This eliminates overage charges and prevents devices from going offline when they exceed individual limits.
What is NIS2 and how does it affect IoT?
NIS2 is a European directive requiring operators of essential services and critical infrastructure to implement cybersecurity measures. For IoT, this means network segmentation, secure configurations, incident response capabilities, and supply chain security.
What is the difference between LTE-M and NB-IoT?
LTE-M supports higher data rates and mobility. It works well for asset tracking and devices that move. NB-IoT offers deeper indoor coverage and lower power consumption. It works well for static devices like meters and environmental sensors.
How many networks should an IoT SIM access per country?
At minimum, two networks per country provide redundancy. If the primary network has an outage or coverage gap, traffic routes to the secondary. More networks provide greater resilience for mission-critical applications.
Next steps
If you manage IoT connectivity across multiple countries and want to simplify operations, reduce costs, and improve security, IXT can help.
Book a demo to see the IXT Connectivity Management Platform in action, or request sample SIMs to test coverage in your target regions.
IXT delivers secure, scalable IoT connectivity with global SIMs, private networking, and smart management tools. Connected. Secure. Everywhere.
Global IoT Connectivity
Discover how our global SIM solutions can keep your IoT devices connected, secure, and operational anywhere in the world
Book a meeting